Publications
Improving malicious PDF classifier with feature engineering: A data-driven approach
Ahmed Falah, Lei Pan, Shamsul Huda, Shiva Pokhrel, Adnan Anwar
(2021), Vol. 115, pp. 314-326, Future generation computer systems, Amsterdam, The Netherlands, C1
Data congestion in VANETs: research directions and new trends through a bibliometric analysis
Tarandeep Bhatia, Ramkumar Ramachandran, Robin Doss, Lei Pan
(2021), pp. 1-43, The Journal of Supercomputing, New York, N.Y., C1
The Audio Auditor: User-Level Membership Inference in Internet of Things Voice Services
Yuantian Miao, Minhui Xue, Chao Chen, Lei Pan, Jun Zhang, Benjamin Zhao, Dali Kaafar, Yang Xiang
(2021), Vol. 2021, pp. 209-228, Proceedings on Privacy Enhancing Technologies, C1
Multipath TCP meets transfer learning: a novel edge-based learning for industrial IoT
Shiva Pokhrel, Lei Pan, Neeraj Kumar, Robin Ram Mohan Doss, Hai Le Vu
(2021), pp. 1-9, IEEE Internet of Things journal, Piscataway, N.J., C1
Unmasking windows advanced persistent threat execution
Rory Coulter, Jun Zhang, Lei Pan, Yang Xiang
(2021), pp. 268-276, TrustCom 2020 : Proceedings of the 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Guangzhou, China, E1
Opportunistic Tracking in Cyber-Physical Systems
Samaneh Rashidibajgan, Thomas Hupperich, Robin Ram Mohan Doss, Lei Pan
(2021), pp. 1672-1679, TrustCom 2020 : Proceedings of the 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Guangzhou, China, E1
Security test MOODLE: a penetration testing case study
A Mudiyanselage, L Pan
(2020), Vol. 42, pp. 372-382, International journal of computers and applications, Abingdon, Eng., C1
Generating security questions for better protection of user privacy
A Anvari, L Pan, X Zheng
(2020), Vol. 42, pp. 329-350, International journal of computers and applications, Abingdon, Eng., C1
Privacy protection in interactive content based image retrieval
Y Huang, J Zhang, L Pan, Y Xiang
(2020), Vol. 17, pp. 595-607, IEEE transactions on dependable and secure computing, Piscataway, N.J., C1
Code Analysis for Intelligent Cyber Systems: A Data-Driven Approach
Rory Coulter, Qing-Long Han, Lei Pan, Jun Zhang, Yang Xiang
(2020), Vol. 524, pp. 46-58, Information Sciences, Amsterdam, The Netherlands, C1
High-capacity (2,3) threshold quantum secret sharing based on asymmetric quantum lossy channels
Hong Lai, Josef Pieprzyk, Ming-Xing Luo, Cheng Zhan, Lei Pan, Mehmet Orgun
(2020), Vol. 19, pp. 1-13, Quantum Information Processing, Berlin, Germany, C1
VoterChoice: A ransomware detection honeypot with multiple voting framework
Chee Ng, Sutharshan Rajasegarar, Lei Pan, Frank Jiang, Yu Zhang
(2020), pp. 1-29, Concurrency and Computation: Practice and Experience, Hoboken, N.J., C1
Meng Wang, Hong Lai, Lei Pan
(2020), Vol. 62, pp. 369-387, Computers, Materials and Continua, Encino, Calif., C1
An efficient voting based decentralized revocation protocol for vehicular ad hoc networks
Miraj Asghar, Lei Pan, Robin Ram Mohan Doss
(2020), pp. 1-18, Digital Communications and Networks, Amsterdam, The Netherlands, C1
JSCSP: a novel policy-based XSS defense mechanism for browsers
Guangquan Xu, Xiaofei Xie, Shuhan Huang, Jun Zhang, Lei Pan, Wei Lou, Kaitai Liang
(2020), pp. 1-17, IEEE Transactions on Dependable and Secure Computing, Piscataway, N.J., C1
Y Tai, Y Wang, Z Wang, F Li, L Wei, L Pan, J Zhang, J Shi
(2020), pp. 1-13, Concurrency computation, Chichester, Eng., C1
Gathering Intelligence on Student Information Behavior Using Data Mining
Lei Pan, N Patterson, S Mckenzie, S Rajasegarar, G Wood-Bradley, J Rough, W Luo, E Lanham, J Coldwell-Neilson
(2020), Vol. 68, pp. 636-658, Library Trends, Baltimore, Md., C1
Software Vulnerability Analysis and Discovery using Deep Learning Techniques: A Survey
Peng Zeng, Guanjun Lin, Lei Pan, Yonghang Tai, Jun Zhang
(2020), Vol. 8, pp. 197158-197172, IEEE Access, Piscataway, N.J., C1
Analysis of weighted quantum secret sharing based on matrix product states
Hong Lai, Josef Pieprzyk, Lei Pan
(2020), Vol. 19, Quantum Information Processing, New York, N.Y., C1
Energy-aware decision-making for dynamic task migration in MEC-based unmanned aerial vehicle delivery system
R Li, X Li, J Xu, F Jiang, Z Jia, D Shao, L Pan, X Liu
(2020), pp. 1-18, Concurrency computation, Chichester, Eng., C1
A Survey of Android Malware Detection with Deep Neural Models
Junyang Qiu, Jun Zhang, Wei Luo, Lei Pan, Surya Nepal, Yang Xiang
(2020), Vol. 53, pp. 1-36, ACM Computing Surveys, New York, N.Y., C1
A review of simulators used for VANETs: The case-study of vehicular mobility generators
T Bhatia, R Ketti Ramachandran, R Ram Mohan Doss, L Pan
(2020), SPIN 2020 Proceedings of the 7th International Conference on Signal Processing and Integrated Networks, Noida, India, E1
A survey on controlling the congestion in vehicle-to-vehicle communication
Tarandeep Bhatia, Ramkumar Ramachandran, Robin Doss, Lei Pan
(2020), pp. 573-578, ICRITO 2020 : Trends and future directions : Proceedings of the IEEE 8th International Conference on Reliability, Infocom Technologies and Optimization, Noida, India, E1
Detection and control of data congestion in vehicular broadcast networks
Tarandeep Bhatia, Ramkumar Ramachandran, Robin Doss, Lei Pan
(2020), pp. 1044-1049, ICRITO 2020 : Trends and future directions : Proceedings of the 2020 8th International Conference on Reliability, Infocom Technologies and Optimization, Noida, India, E1
A comprehensive review on the vehicular ad-hoc networks
Tarandeep Bhatia, Ramkumar Ramachandran, Robin Doss, Lei Pan
(2020), pp. 515-520, ICRITO 2020 : Trends and future directions : Proceedings of the 2020 8th International Conference on Reliability, Infocom Technologies and Optimization, Noida, India, E1
Security Evaluation of Smart Contract-Based On-chain Ethereum Wallets
Purathani Praitheeshan, Lei Pan, Robin Doss
(2020), Vol. 12570, pp. 22-41, Network and System Security. NSS 2020, Melbourne, Australia, E1
Graph Deep Learning Based Anomaly Detection in Ethereum Blockchain Network
Vatsal Patel, Lei Pan, Sutharshan Rajasegarar
(2020), Vol. 12570, pp. 132-148, Network and System Security. NSS 2020, Melbourne, Australia, E1
Noise-resistant statistical traffic classification
B Wang, J Zhang, Z Zhang, L Pan, Y Xiang, D Xia
(2019), pp. 454-466, IEEE transactions on big data, Piscataway, N.J., C1
Efficient quantum private queries based on quantum key distribution with pulse-position modulation
Hong Lai, Mingxing Luo, Yongjian Xu, Josef Pieprzyk, Lei Pan, Jun Zhang, Mehmet Orgun
(2019), Vol. 29, pp. 1-7, Laser physics, Bristol, Eng., C1
Predicting the impact of android malicious samples via machine learning
Junyang Qiu, Wei Luo, Lei Pan, Yonghang Tai, Jun Zhang, Yang Xiang
(2019), pp. 1-14, IEEE Access, Piscataway, N.J., C1
Shiju Sathyadevan, K Achuthan, Robin Ram Mohan Doss, Lei Pan
(2019), Vol. 7, pp. 92419-92435, IEEE access, Piscataway, N.J., C1
S Huda, J Abawajy, B Al-Rubaie, L Pan, M Hassan
(2019), Vol. 101, pp. 1247-1258, Future generation computer systems, Amsterdam, The Netherlands, C1
A3CM: automatic capability annotation for android malware
Junyang Qiu, Jun Zhang, Wei Luo, Lei Pan, Surya Nepal, Yu Wang, Yang Xiang
(2019), Vol. 7, pp. 147156-147168, IEEE Access, Piscataway, N.J., C1
Data-driven cyber security in perspective-intelligent traffic analysis
Rory Coulter, Qing-Long Han, Lei Pan, Jun Zhang, Yang Xiang
(2019), pp. 1-13, IEEE Transactions on Cybernetics, Piscataway, N.J., C1
Software vulnerability discovery via learning multi-domain knowledge bases
Guanjun Lin, Jun Zhang, Wei Luo, Lei Pan, Olivier De Vel, Paul Montague, Yang Xiang
(2019), pp. 1-17, IEEE transactions on dependable and secure computing, Piscataway, N.J., C1
A literature review of inter-enterprise SOA in small and medium business communities
A Andriyanto, R Doss, L Pan, P Yustianto
(2019), pp. 547-554, ICITSI 2018 : Proceedings of the 5th International Conference on Information Technology Systems and Innovation, Bandung and Padang, Indonesia, E1
Wei Du, Qiwang Lei, Qiang He, Wei Liu, Feifei Chen, Lei Pan, Tao Lei, Hailiang Zhao
(2019), pp. 154-158, ICWS 2019 : Proceedings of the IEEE International Conference on Web Services, Milan, Italy, E1
Cyber security insights into self-proclaimed virtual world hackers
Nicholas Patterson, M Hobbs, F Jiang, L Pan
(2019), pp. 73-87, CSITEC 2019 : Proceedings of the 5th International Conference on Computer Science, Information Technology, Vienna, Austria, E1
A Visualization-Based Analysis on Classifying Android Malware
R Coulter, L Pan, J Zhang, Y Xiang
(2019), Vol. 11806, pp. 304-319, Machine Learning for Cyber Security, Xi'an, China, E1
Data-Driven Android Malware Intelligence: A Survey
J Qiu, S Nepal, W Luo, L Pan, Y Tai, J Zhang, Y Xiang
(2019), Vol. 11806, pp. 183-202, Machine Learning for Cyber Security, Xi’an, China, E1
Attainable hacks on keystore files in ethereum wallets--a systematic analysis
Purathani Praitheeshan, Y Xin, Lei Pan, Robin Ram Mohan Doss
(2019), FNSS 2019 : Future Network Systems and Security, Melbourne, Australia, E1
Password strength estimators trained on the leaked password lists
C Schaffer, Lei Pan
(2019), Vol. 1116, pp. 219-231, ATIS 2019: Applications and Techniques in Information Security, Thanjavur, India, E1
Cloud Forensics Investigations Relationship: A Model And Instrument
Younis Al Husaini, Matthew Warren, Lei Pan, Mansoor Al Gharibi
(2019), pp. 778-788, ACIS 2019 : Security and Privacy : Proceedings of the 30th Australasian Conference on Information Systems, Perth, Western Australia, E1
Domain-adversarial graph neural networks for text classification
Man Wu, Shirui Pan, Xingquan Zhu, Chuan Zhou, Lei Pan
(2019), pp. 648-657, ICDM 2019 : Proceedings of the IEEE International Conference on Data Mining, Beijing, China, E1
Honeypot frameworks and their applications: a new framework
Chee Ng, Lei Pan, Y Xiang
(2018), Singapore, A1
Comprehensive analysis of network traffic data
Y Miao, Z Ruan, L Pan, J Zhang, Y Xiang
(2018), Vol. 30, pp. 1-16, Concurrency and computation: practice and experience, Chichester, Eng., C1
Intelligent agents defending for an IoT world: a review
R Coulter, L Pan
(2018), Vol. 73, pp. 439-458, Computers and security, Amsterdam, The Netherlands, C1
Cross-project transfer representation learning for vulnerable function discovery
G Lin, J Zhang, W Luo, L Pan, Y Xiang, O De Vel, P Montague
(2018), Vol. 14, pp. 3289-3297, IEEE transactions on industrial informatics, Piscataway, N.J., C1
Big network traffic data visualization
Z Ruan, Y Miao, L Pan, Y Xiang, J Zhang
(2018), Vol. 77, pp. 11459-11487, Multimedia tools and applications, New York, N.Y., C1
H Lai, M Luo, J Pieprzyk, J Zhang, L Pan, M Orgun
(2018), Vol. 61, pp. 1-11, Science China information sciences, Berlin, Germany, C1
Identifying items for moderation in a peer assessment framework
S James, E Lanham, V mak, L Pan, T Wilkin, G Wood-bradley
(2018), Vol. 162, pp. 211-219, Knowledge-based systems, Amsterdam, The Netherlands, C1
H Lai, M Luo, J Zhang, J Pieprzyk, L Pan, M Orgun
(2018), Vol. 17, pp. 1-11, Quantum information processing, New York, N.Y., C1
Exploring feature coupling and model coupling for image source identification
Y Huang, L Cao, J Zhang, L Pan, Y Liu
(2018), Vol. 13, pp. 3108-3121, IEEE transactions on information forensics and security, Piscataway, N.J., C1
Object localisation through clustering unreliable ultrasonic range sensors
L Pan, X Zheng, P Kolar, S Bangay
(2018), Vol. 27, pp. 268-280, International journal of sensor networks, Olney, Eng., C1
H Lai, M Luo, Y Xiu, J Pieprzyk, J Zhang, L Pan, M Orgun
(2018), Vol. 15, Laser physics letters, Bristol, Eng., C1
H Lai, M Luo, Y Xu, J Pieprzyk, J Zhang, L Pan, M Orgun
(2018), Vol. 70, pp. 384-390, Communications in theoretical physics, Bristol, Eng., C1
Practical overview of security issues in wireless sensor network applications
H Radhappa, L Pan, J Xi Zheng, S Wen
(2018), Vol. 40, pp. 202-213, International journal of computers and applications, Abingdon, Eng., C1
Distributed detection of zero-day network traffic flows
Y Miao, L Pan, S Rajasegarar, J Zhang, C Leckie, Y Xiang
(2018), Vol. 845, pp. 173-191, AusDM 2017 : Proceedings of the 15th Australasian Data Mining Conference 2017, Melbourne, Vic., E1
Identifying drawbacks in malicious PDF detectors
A Falah, L Pan, M Abdelrazek, R Doss
(2018), Vol. 878, pp. 128-139, FNSS 2018 : Proceedings of the Future Network Systems and Security Conference 2018, Paris, France, E1
Keep calm and know where to focus: measuring and predicting the impact of Android Malware
J Qiu, W Luo, S Nepal, J Zhang, Y Xiang, L Pan
(2018), Vol. 11323, pp. 238-254, ADMA 2018: Proceedings of the 14th International Conference on Advanced Data Mining and Applications, Nanjing, China, E1
A quantitative approach to design special purpose systems to measure hacking skills
Ahmed Falah, Lei Pan, F Chen
(2018), pp. 54-61, TALE 2018 : Engineering next-generation learning : Proceedings of the 2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering, Wollongong, N.S.W., E1
A scalable and efficient PKI based authentication protocol for VANETs
M Asghar, R Doss, L Pan
(2018), pp. 1-3, ITNAC 2018 : Proceedings of the 2018 28th International Telecommunication Networks and Applications Conference, Sydney, N.S.W., E1
Cloud forensics relationship between the law enforcement and cloud service providers
Younis Al Husaini, Matthew Warren, Lei Pan
(2018), pp. 79-88, CWAR 2018 : Proceedings of the 17th Australian Cyber Warfare Conference, Melbourne, Victoria, E1
Fast and simple high-capacity quantum cryptography with error detection
H Lai, M-X Luo, J Pieprzyk, J Zhang, L Pan, S Li, M Orgun
(2017), Vol. 7, pp. 1-11, Scientific reports, London, Eng., C1
Visualization of big data security - a case study on the KDD99 cup data set
Z Ruan, Y Miao, L Pan, N Patterson, J Zhang
(2017), Vol. 3, pp. 250-259, Digital communications and networks, Amsterdam, The Netherlands, C1
Cyber security attacks to modern vehicular systems
L Pan, X Zheng, H Chen, H Luan, H Bootwala, L Batten
(2017), Vol. 36, pp. 90-100, Journal of information security and applications, Amsterdam, The Netherlands, C1
Visual representation of penetration testing actions and skills in a technical tree model
A Falah, L Pan, M Abdelrazek
(2017), pp. 1-10, ACSW 2017 : Proceedings of the Australasian Computer Science Week Multiconference, Geelong, Vic., E1
Security analysis of modern mission critical android mobile applications
X zheng, L Pan, E Yilmaz
(2017), pp. 1-9, ACSW 2017 : Proceedings of the Australasian Computer Science Week Multiconference, Geelong, Victoria, E1
Comprehensive analysis of network traffic data
Y Miao, Z ruan, L Pan, J Zhang, Y Xiang, Y Wang
(2017), pp. 423-430, CIT 2016 : Proceedings of the IEEE International Conference on Computer and Information Technology, Nadi, Fiji, E1
Portguard - An authentication tool for securing ports in an IoT gateway
S Sathyadevan, V Vejesh, R Doss, L Pan
(2017), pp. 624-629, PerCom 2017 : IEEE International Conference on Pervasive Computing and Communications Workshops, Kona, Hawaii, E1
Online peer marking with aggregation functions
S James, L Pan, T Wilkin, L Yin
(2017), pp. 1-6, FUZZ-IEEE 2017 : IEEE International Conference on Fuzzy Systems, Naples, Italy, E1
A testbed for security analysis of modern vehicle systems
X Zheng, L Pan, H Chen, R Di Pietro, L Batten
(2017), pp. 1090-1095, trustcom/BigDataSE/ICESS 2017 : Proceedings of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Sydney, N.S.W., E1
Hybrid threshold adaptable quantum secret sharing scheme with reverse Huffman-Fibonacci-tree coding
H Lai, J Zhang, M-X Luo, L Pan, J Pieprzyk, F Xiao, M Orgun
(2016), Vol. 6, pp. 1-12, Scientific reports, London, Eng., C1
Investigating security vulnerabilities in modern vehicle systems
X Zheng, L Pan, H Chen, P Wang
(2016), Vol. 651, pp. 29-40, ATIS 2016 : Proceedings of the International Conference on Applications and Techniques in Information Security, Cairns, Queensland, E1
Robustness and embedding capacity enhancement in time-spread echo-based audio watermarking
I Natgunanathan, Y Xiang, L Pan, P Chen, D Peng
(2016), pp. 1536-1541, ICIEA 2016: Proceedings of the IEEE 11th Conference on Industrial Electronics and Applications, Hefei, China, E1
The usefulness metrics of the most popular eReader used by higher education students
D Sari, E Lanham, L Pan
(2015), Vol. 12, pp. 203-212, Issues in informing science and information technology, Santa Rosa, Cailf., C1
Segregation-of-duties conflicts in the insider threat landscape: an overview and case study
S Ballesteros, L Pan, L Batten, G Li
(2015), pp. 367-370, ERMM 2015: Proceedings of the 2015 International Conference on Education Reform and Modern Management, Hong Kong, E1
Enhanced Twitter sentiment analysis by using feature selection and combination
A Yang, J Zhang, L Pan, Y Xiang
(2015), pp. 52-57, SOCIALSEC 2015: Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, Hangzhou, China, E1
A novel method for detecting double compressed Facebook JPEG images
C Ng, L Pan, Y Xiang
(2014), Vol. 490, pp. 191-198, Communications in Computer and Information Science, Dordrecht , Germany, B1
Privacy preserving in location data release: A differential privacy approach
P Xiong, T Zhu, L Pan, W Niu, G Li
(2014), Vol. 8862, pp. 183-195, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), B1
Forensic identification of students outsourcing assignment projects from freelancer.com
M Monnik, L Pan
(2014), Vol. 490, pp. 183-190, Communications in Computer and Information Science, Berlin, Germany, B1
Investigating Facebook groups through a random graph model
D Pallegedara, L Pan
(2014), Vol. 9, pp. 25-34, Journal of multimedia, Finland, C1
Privacy preserving collaborative filtering for KNN attack resisting
T Zhu, G Li, L Pan, Y Ren, W Zhou
(2014), Vol. 4, pp. 1-14, Social network analysis and mining, Berlin, Germany, C1-1
L Pan, S Bangay
(2014), pp. 66-72, CyberC 2014 : The 6th International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, Shanghai, China, E1
Developing a cloud computing based approach for forensic analysis using OCR
M Trojahn, L Pan, F Schmidt
(2013), pp. 59-68, Proceedings - 7th International Conference on IT Security Incident Management and IT Forensics, IMF 2013, E1
Developing an empirical algorithm for protecting text-based captchas against segmentation attacks
L Pan, Y Zhou
(2013), pp. 636-643, Proceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013, E1
Hypothesis generation and testing in event profiling for digital forensic investigations
L Batten, L Pan, N Khan
(2012), Vol. 4, pp. 1-14, International Journal of Digital Crime and Forensics, C1
Using hypothesis generation in event profiling for digital forensic investigations
L Pan, N Khan, L Batten
(2012), pp. 76-86, WDFIA 2012 : Proceedings of the Seventh International Workshop on Digital Forensics & Incident Analysis:, Crete, Greece, E1
Detecting SMS-based control commands in a Botnet from infected android devices
A Nguyen, L Pan
(2012), pp. 23-27, ATIS 2012 : Proceedings of the 3rd Applications and Technologies in Information Security Workshop, Melbourne, Vic., E1
Towards a sustainable assessment strategy for digital forensic education and training
L Pan, D Hutchinson, N Khan
(2012), Proceedings of IEEE International Conference on Teaching, Assessment, and Learning for Engineering, TALE 2012, E1
A Grobner-Shirshov algorithm for applications in internet security
A Kelarev, J Yearwood, P Watters, X Wu, L Ma, J Abawajy, L Pan
(2011), Vol. 35, pp. 807-820, Southeast Asian bulletin of mathematics, Hong Kong, C1
Using relationship-building in event profiling for digital forensic investigations
L Batten, L Pan
(2011), Vol. 56, pp. 40-52, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, E1
Image source detection : a case study on Facebook images taken by iPhones
L Pan, N Trepanic
(2011), pp. 39-46, ATIS 2011 : Workshop proceedingof ATIS 2011. Melbourne, November 9th, 2011. Second Applications and Techniques in Information Security Workshop, Melbourne, Vic., E1
Internet security applications of the Munn rings
A Kelarev, J Yearwood, P Watters, X Wu, J Abawajy, L Pan
(2010), Vol. 81, pp. 162-171, Semigroup Forum, C1
Dynamic addressing in wireless sensor networks Without location awareness
R Doss, D Chandra, L Pan, W Zhou, M Chowdhury
(2010), Vol. 26, pp. 443-460, Journal of Information Science and Engineering, C1
Robust performance testing for digital forensic tools
L Pan, L Batten
(2009), Vol. 6, pp. 71-81, Digital Investigation, C1
Robust correctness testing for digital forensic tools
L Pan, L Batten
(2009), Vol. 8 LNICST, pp. 54-64, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, E1
Teaching digital forensics to undergraduate students
L Batten, L Pan
(2008), Vol. 6, pp. 54-56, IEEE Security and Privacy, C1
Measure of integrity leakage in live forensic context
L Pan, A Savoldi, P Gubian, L Batten
(2008), pp. 534-537, IIH-MSP 2008 : Proceedings of the Intelligent Information Hiding and Multimedia Signal Processing 2008 international conference, Harbin, China, E1-1
A lower bound on effective performance testing for digital forensic tools
L Pan, L Batten
(2007), pp. 117-130, Proceedings - SADFE 2007: Second International Workshop on Systematic Approaches to Digital Forensic Engineering, E1
An effective and efficient testing methodology for correctness testing for file recovery tools
L Pan, L Batten
(2007), Vol. 2, pp. 103-107, Proceedings - 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2007., E1
Lease based addressing for event-driven wireless sensor networks
R Doss, D Chandra, L Pan, W Zhou, M Chowdhury
(2006), pp. 251-256, Proceedings - International Symposium on Computers and Communications, E1
Address reuse in wireless sensor networks
R Chellappa Doss, D Chandra, L Pan, W Zhou, M Chowdhury
(2006), pp. 329-333, ATNAC, Australian Telecommuncation Networks and Applications Conference, 2006., Melbourne, Australia, E1
R Doss, L Pan
(2006), pp. 409-413, ATNAC, Australian Telecommuncation Networks and Applications Conference, 2006., Melbourne, Australia, E1
Reproducibility of digital evidence in forensic investigations
L Pan, L Batten
(2005), Digital Forensic Research Workshop 2005, E1
Funded Projects at Deakin
Other Public Sector Funding
Cyber-Safe Connected Vehicles: Ensuring Secure, Trusted, and Robust Cooperative Automotive systems.
Prof Robin Ram Mohan Doss, Prof Seng Loke, Dr Lei Pan, Dr Rolando Trujillo Rasua, Dr Frank Jiang, Dr Leo Zhang
- 2019: $296,940
Industry and Other Funding
Implementation of transaction privacy protocols on Distributed Ledger systems.
Dr Lei Pan
- 2019: $14,500
Other Funding Sources
Traceability and Path Authentication in Dynamic Supply Chains.
Prof Robin Ram Mohan Doss, Dr Rolando Trujillo Rasua, Dr Lei Pan
- 2021: $15,000
Supervisions
Ahmed Falah
Thesis entitled: Improving PDF Maldoc Detection via Data-Driven Feature Engineering
Doctor of Philosophy (Information Technology), School of Information Technology
Chee Keong (Allan) Ng
Thesis entitled: VoterChoice: A Ransomware Detection Honeypot with Multiple Voting Concept
Doctor of Philosophy (Information Technology), School of Information Technology
Miraj Asghar
Thesis entitled: Security and Privacy for Vehicular Adhoc Networks
Doctor of Philosophy (Information Technology), School of Information Technology
Shiju Sathyadevan
Thesis entitled: Design of a Secure Architecture for the Internet of Things.
Doctor of Philosophy (Information Technology), School of Information Technology
Agustinus Andriyanto
Thesis entitled: Service-based Reference Architecture in the Context of Inter-Enterprise Architecture
Doctor of Philosophy (Information Technology), School of Information Technology
Russul Dh. Abdul Jabar Al-Anni
Thesis entitled: Cancer Prognosis Based on Knowledge Discovery from Clinic and Biological Data Sets
Doctor of Philosophy (Information Technology), School of Information Technology
Ahmed Abdulateef Mohammed
Thesis entitled: Robust Approaches for Face Recognition
Doctor of Philosophy (Information Technology), School of Information Technology
Purnomo Yustianto
Thesis entitled: General Framework for Service Engineering Analysis and Design
Doctor of Philosophy (Information Technology), School of Information Technology
Moutaz Alazab
Thesis entitled: Analysis on Smartphone Devices for Detection and Prevention of Malware
Doctor of Philosophy (Information Technology), School of Information Technology